Red Hot Cyber

Cybersecurity, Cybercrime News and Vulnerability Analysis

Banner Desktop
Precedente Successivo

Latest news

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything Cyber News

Going 50 Years Without Charging Your Phone: Here’s the Chinese Battery That Will Change Everything

Beijing-based Betavolt claims to have developed a nuclear battery that represents the world's first achievement in the miniaturization of atomic...
Silvia Felici - October 31, 2025
Mossad, the rigged supply chain, and intimidated judges Cybercrime

Mossad, the rigged supply chain, and intimidated judges

Yossi Cohen, former director of the Mossad, has said publicly two things that usually remain locked away in a room...
Sandro Sana - October 31, 2025
Nvidia invests $1 billion in Nokia to develop 6G networks with AI Cyber News

Nvidia invests $1 billion in Nokia to develop 6G networks with AI

Jen-Hsun Huang dropped a bombshell: Nvidia has reportedly invested $1 billion in Nokia. Yes, Nokia is the company that made...
Silvia Felici - October 31, 2025
Linux and gaming: an increasingly reliable combination Cyber News

Linux and gaming: an increasingly reliable combination

According to Boiling Steam , the number of Windows games running reliably on Linux is the highest ever recorded. The...
Redazione RHC - October 31, 2025
Russian Interior Ministry officials arrested the creators of the Medusa malware Cyber News

Russian Interior Ministry officials arrested the creators of the Medusa malware

The Russian programming team behind the Medusa malware has been arrested by officials from the Russian Interior Ministry, with the...
Sandro Sana - October 31, 2025
Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner Cyber News

Atroposia: The MaaS platform that provides a Trojan with a vulnerability scanner

Varonis researchers have discovered the Atroposia MaaS (malware-as-a-service) platform. For $200 a month, its customers receive a remote access Trojan...
Massimiliano Brolli - October 30, 2025

It’s Not Your PC’s Weak Link, It’s Your Mind: Exercises to Defend Yourself from Hackers

Welcome to our second installment! Last week, we explored the battlefield of the human mind, understanding how the coevolution of hackers and defenders is a game of psychological chess, and...

Google pushes AI as the default search, risking blackouts for independent publishers and blogs.

Google wants to make it easier for users to access AI Mode by allowing them to set it as their default search (instead of traditional links). AI Mode is a...

Apache Jackrabbit RCE Vulnerability: Exploitation in Progress, Update Now

A dangerous vulnerability has been discovered in Apache Jackrabbit that could lead to remote execution of arbitrary code and compromise enterprise systems. The issue is registered as CVE-2025-58782 and affects...

Italian call center companies leave all audio recordings online

Italian companies that use online telephony platforms (VoIP) based on open-source software such as Asterisk and Vicidial rely on these systems to contact Italian citizens on a daily basis, offering...

Tasting the Exploit: HackerHood testa l’exploit di WINRAR CVE-2025-8088

Manuel Roccon, leader of Red Hot Cyber's HackerHood ethics team, has created a detailed video demonstration on YouTube that demonstrates in a practical way how the exploit based on the...

NightshadeC2, the new botnet that uses unconventional methods to bypass protection

eSentire has reported the discovery of a new botnet called NightshadeC2, which uses unconventional methods to bypass protection and sandboxes. The malware is distributed via counterfeit versions of legitimate programs...

WhatsApp and Apple in emergency: DNG bug allows remote control without clicking

On August 20, Apple released an unscheduled security update for all major operating systems: iOS, iPadOS, macOS, and other platforms. The patch addresses the CVE-2025-43300 vulnerability in the ImageIO module:...

Stealerium and Phantom: How Open-Source Infostealers Are Taking the World by storm

Researchers at Proofpoint, a leader in cybersecurity and information protection, have detected a worrying increase in the use of open-source malware, such as Stealerium and Phantom Stealer, by opportunistic cybercriminals....

Apple launches Security Research Device 2026 program for security researchers

Apple has announced that it will accept applications for the Security Research Device Program (SRDP) 2026. Bug hunters interested in receiving an iPhone configured specifically for security research have until...

Salesloft Drift Incident Expands: Tenable Confirms Customer Data Breach

Tenable also suffered a compromise of contact information and support case details for some customers. The company said the incident was related to a large-scale data theft operation, which aimed...

Discover the latest critical CVEs issued and stay updated on the most recent vulnerabilities. Or search for a specific CVE